Lucene search

K
cvelistWordfenceCVELIST:CVE-2021-4350
HistoryJun 07, 2023 - 1:51 a.m.

CVE-2021-4350

2023-06-0701:51:18
Wordfence
www.cve.org
wordpress
file manager
html injection
unauthenticated
vulnerability
ajax action

7.2 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:L

7.3 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

47.3%

The Frontend File Manager plugin for WordPress is vulnerable to Unauthenticated HTML Injection in versions up to, and including, 18.2. This is due to lacking authentication protections on the wpfm_send_file_in_email AJAX action. This makes it possible for unauthenticated attackers to send emails using the site with a custom subject, recipient email, and body with unsanitized HTML content. This effectively lets the attacker use the site as a spam relay.

CNA Affected

[
  {
    "vendor": "nmedia",
    "product": "Frontend File Manager Plugin",
    "versions": [
      {
        "version": "*",
        "status": "affected",
        "lessThan": "18.3",
        "versionType": "semver"
      }
    ],
    "defaultStatus": "unaffected"
  }
]

7.2 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:L

7.3 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

47.3%

Related for CVELIST:CVE-2021-4350